Technology ❯ Cybersecurity ❯ Data Breaches ❯ Identity Theft
Early findings point to a third‑party API weakness at an integration partner.